The MITRE ATT&CK framework is quickly becoming a focal point in the security world and for good reason. This framework provides a consistent, industry-wide standard on which you can assess the effectiveness of your security monitoring and alerting capabilities…Read more! Register and watch this webcast now!
Security is a broad, complex topic with many different facets. And, of course, security is top of mind for many IT teams.Automating software patch management to remediate vulnerabilities, Automating the deployment and management of antivirus and anti-malware software, and more! Register and watch this webcast now!
Insiders have something outside threat actors never will: trust. Paul Asadoorian and Matt Alderman will discuss the challenges of insider threats, including data exfiltration. Kevin Donovan, Senior Solutions Architect from ObserveIT, will then discuss the top strategies to stop both accidental and malicious insider threats in their tracks, including:The top 7 most common insider threat […]
Do you struggle identifying and measuring enterprise risk? How do you prioritize vulnerabilities and threats within your organization? In this session, Paul Asadoorian and Matt Alderman discuss the essential components needed to understand your IT assets, security posture, and potential risks. Learn how to quickly identify and prioritize security incidents, vulnerabilities, and enterprise risks and […]
Do you struggle with scaling human analysts to process the sheer volume of available threat data? How do you cut out laborious manual collection and get more context apart from threat feeds alone? In this session, Paul Asadoorian and Matt Alderman discuss the challenges of integrating threat feeds into your security operations center (SOC). Allan […]
Do you need to mitigate user-based threats to privileged files from both insiders and outsiders? How do you know if sensitive files have been accessed or leaked? In this session, Paul Asadoorian and Matt Alderman discuss the history of file integrity monitoring and where is the market heading. Learn how to protect your organization’s critical […]
Does your security investigation and incident response workflow “spark joy,” or does it just leave you with more questions that are tough to answer? How do you improve your current data collection, tools, and workflows? In this session, ExtraHop’s VP of Cyber Security Engineering, Matt Cauthorn, will provide practical advice for how to identify areas […]
Paul discusses The State of IoC and IR with Michael Gordover from ObserveIT, Myke Lyons from Servicenow, and Michael Clark from Rapid7. Indicator of compromise (IOC), in computer forensics, is an artifact observed on a network or in an operating system that with high confidence indicates a computer intrusion. Typical IOCs are virus signatures and IP […]
Join us as we discuss how to turn Active Directory into an Intrusion Prevention System, to prevent AD reconnaissance, credential theft, and lateral movement while empowering incident response teams with near-real-time containment and threat intelligence on previously unidentified tradecraft. Containment, powered by attackers giving themselves away, of course, helps incident responders move at code speed! […]
Join Braden Preston, Matt Alderman, and Paul Asadoorian talk about Phishing. Don’t miss your chance to learn and ask questions about this single autonomous endpoint protection agent that eliminates the need for AV, NGAV, EDR, incident response tools and scripts, and now adds malicious macro phishing prevention. Register and watch this webcast now!